A breach in supposedly secure keys given to employees by private companies vindicates previous warnings by cryptographers that companies should use more difficult keys, and that companies have not been cautious enough using such keys because of their assumed security.
Instead of hiring "upper-class twits from Oxford and Cambridge," A government communications agency tried a new angle on recruiting hackers. They decided to combat hackers with other experienced hackers by posting an online puzzle and offering a job interview to those who solved it.
Here's a 2008 New York Times piece on Girl Talk. Whether or not his fair use argument would hold up in court, it seems clear that music labels aren't particularly interested in suing him for his all-sample approach to music creation.
Check out this article! It's about a recent security breach of heathcare.gov that was made possible due to a test server with a default password that hadn't been changed and a lack of regular security scans.
Today's New York Times features a debate of sorts over the value of increased surveillance after the Paris attacks. Click through for five different views on this complex issue.
Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
Britain's code-breakers acknowledged Friday that an encrypted handwritten message from World War II, found on the leg of a long-dead carrier pigeon in a household chimney in southern England, has thwarted all their efforts to decode it since it was sent to them last month.